Identification of Sybil attacks on social networks using a framework based on user interactions

被引:6
|
作者
Asadian, Hooman [1 ]
Javadi, Hamid Haj Seyed [2 ]
机构
[1] Islamic Azad Univ, Sci & Res Branch, Dept Comp Engn, Tehran, Iran
[2] Shahed Univ, Dept Math & Comp Sci, Tehran, Iran
来源
SECURITY AND PRIVACY | 2018年 / 1卷 / 02期
关键词
community detection; interactions among users; Jaccard index; social networks; Sybil attacks;
D O I
10.1002/spy2.19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The popularity of modern social networks has rendered social media platforms vulnerable to malicious activities. One such activity is a Sybil attack, in which a single entity emulates the behaviors of multiple users and attempts to create problems for other users and a network itself. This problem has prompted researchers to develop several techniques for preventing Sybil attacks, but in most cases, the efficiency assumptions that underlie proposed methods are not oriented toward reality. The current study puts forward an efficient framework for identifying Sybil attacks. The highly precise framework is underlain by rational assumptions and detects attacks on the basis of the structural characteristics of social networks and the social interactions among users. We evaluate our proposed framework using both synthetic and real world social network topologies. We show that SybilUncover is able to accurately identify high precision rate. Moreover, SybilUncover performs orders of magnitudes better than existing Sybil detection mechanisms.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Sybil defenses in DHT networks based on social relationships
    Han, Xinhui
    Xiao, Xianquan
    Zhang, Jianyu
    Liu, Bingshuang
    Zhang, Yuan
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2014, 54 (01): : 1 - 7
  • [32] On The Effectiveness of Sybil Defenses Based on Online Social Networks
    Koll, David
    Li, Jun
    Stein, Joshua
    Fu, Xiaoming
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [33] User Interactions in Social Networks and their Implications
    Wilson, Christo
    Boe, Bryce
    Sala, Alessandra
    Puttaswamy, Krishna P. N.
    Zhao, Ben Y.
    EUROSYS'09: PROCEEDINGS OF THE FOURTH EUROSYS CONFERENCE, 2009, : 205 - 218
  • [34] A Novel Two-Stage Framework for User Identification Across Social Networks
    Gu, Shuang
    Yuan, Feng
    Wu, Hanqian
    Shao, Han
    Cheng, Lu
    2019 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND BIG DATA (ICAIBD 2019), 2019, : 266 - 270
  • [35] Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks
    de Asis Lopez-Fuentes, Francisco
    Balleza-Gallegos, Salvador
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1262 - 1267
  • [36] User behavior-based and graph-based hybrid approach for detection of Sybil Attack in online social networks
    Jethava, Gordhan
    Rao, Udai Pratap
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
  • [37] Similarity-Based User Identification Across Social Networks
    Zamani, Katerina
    Paliouras, Georgios
    Vogiatzis, Dimitrios
    SIMILARITY-BASED PATTERN RECOGNITION, SIMBAD 2015, 2015, 9370 : 171 - 185
  • [38] Using radio device fingerprinting for the detection of impersonation and Sybil attacks in wireless networks
    Sieka, Bartlomiej
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2006, 4357 : 179 - 192
  • [39] Exploiting User Friendship Networks for User Identification across Social Networks
    Qu, Yating
    Xing, Ling
    Ma, Huahong
    Wu, Honghai
    Zhang, Kun
    Deng, Kaikai
    SYMMETRY-BASEL, 2022, 14 (01):
  • [40] User characteristics that influence judgment of social engineering attacks in social networks
    Albladi, Samar Muslah
    Weir, George R. S.
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2018, 8